Links

Mark Heinrich, Cyber Journalist, and an influencer of ISC2 and IEEE is our guest today. Mark shares his knowledge and experience as a professor and expert called upon to review CISSP domains. He is a great resource for cyber newcomers and he provides many of his tricks to excel in cyber industry in today’s show. He discusses the skills to resonate and revolutionize the cyber industry and what should be taught in schools and universities. We really enjoyed his description of the pitfalls to look out for in cyber world and some of his words of wisdom. Today's discussion ranges from required industry skills, importance of certifications, flexibility requirements in cybersecurity industry. This is a great relaxed candid conversation which you will not want to miss.

In today’s show, host of the New Cyber Frontier Chris Gorog and hosts of Colorado=Security Alex Wood and Robb Reck share their thoughts, experiences, knowledge, and the focus of their shows in relation to cybersecurity efforts in Colorado Springs. Today's Joint show between the two Podcast cast showcase the strength of Cybersecurity in the State of Colorado as they discuss the impact of both podcasts at the national level and how they have changed the security approach of companies benefiting the entire society. Chris being the Cybersecurity lead at Colorado Technical university explains the programs offered by CTU depending on the industry needs and opportunities for students. Alex and Rob being CISO’s of their companies explain their involvement with the local ISSA chapter. You will love the discussion of different security needs for next generation, best practices, and virtual trust models discussed in the show.

Today, our guest Charles White articulates his view on how encryption can be a solution for the cyber industries challenges. He discusses new thought processes in using encryption to create cyber controls and how this new technology can shrink the attack surface to reduce advanced persistent cyber threats. As he sees it, these are powerful weapons for defense from offensive cyber attacks. Mr. White gives some advice on the steps you can take for yourself to intelligently protect your network, system, and personal resources on the web. Listen for some great suggestions on how to control your private information.

Our guest Dr. Andy Heo, the Information sharing architect at National Cyber Exchange ISAO discusses the connection between human biology and computer operations. Dr. Heo has an interesting background for a cyber security industry practitioner as he began his educational career studying biology. Thought Biology may seem disconnected from Cybersecurity you will hear otherwise. It is fascinated how often we separate fields of study which seem irrelevant, however the only reason they are siloed is because it is so rare to find individuals which cross between those fields. Hear today about some of the latest internet forensics and how modeling human viruses and diseases benefits the Cybersecurity Industry. We also have a great conversation about the issues of cross field polarization of Gen Z, and how this next generation is invaluable to our industry. Dr. Heo is an amazing motivator for young people and Gen Z’ers to join the cyber industry, you will definitely hear more from him and his efforts at National Cyber Exchange in the future.

CyberPatriot coach of the year, our guest Maj Bill Blatchley has coached his local Cadet Squadrons’ teams to eight straight appearances in the final round of this national competition. Mr. Blatchley Talks about national efforts that are getting kids involved with cyber security, and how you can connect with your children with CyberPatriot. Some of our most brilliant youths are using these programs to get a jumpstart on their technical careers. CyberPatriot and our guest are not only teaching cyber skills but also ingraining critical thinking, teamwork, and leadership skills. Mr. Blatchley explains that this is a great opportunity for students to gain cyber skills to use in real-life and real-world careers. Skills taught in CyberPatriot, can be a path for students to pursue careers in military of just get a jumpstart on a career in the latest technology with the greatest opportunity.

Our today’s guest Paul Parker, chief technologist for federal and national government at SolarWinds, talks about creating a cyber culture and how to get people interested in cybersecurity. Cyber attacks are getting more complex and attackers more creative. Paul explains difference between cybersecurity problems faced by corporate and their government sector counterparts. Get some great insight on how people can crossover and how to addressed these differences. Is there a cyber security stalemate? Hear what our guest says are difficulties faced by workforce development and reasons for limited industry improvement. If your strategy is for moving to the cloud you will want to hear several cloud frameworks areas discussed by our guest and how to set up a needed multi-level security. Moving forward how the cloud and new GDPR regulations will impact your businesses.

Today's show is about Internet of Things (IoT) and security of billions of consumer devices. We have many diverse and distributed mobile technologies, but today’s IoT models are focused on many different products to secure individual silos. Our guest Babak Pasdar is an ethical hacker, a globally-recognized expert in Cyber-Security, the Cloud, and Crypto-currency, and the CEO and CTO of Acreto. As the current technology landscape moves to everything being either Cloud or edge Devices, new challenges arrive. Babak expands on the challenges to IoT devices such as cloud security, virtual security, and cyber physical IOT devices, that completely neutralize current security model. As many different products become available for IoT security how will we address the complexity of cloud and virtual environments? How will this landscape affect the organizations financially? Our guest gives his thought on this new model for security for IoT which will have the ability to deliver uniform and consistent security for distributed and diverse technology. This all sounds very experimental but we hope that you get some insight from his approach to IoT problems.

Today's podcast discusses how to provide security and continuity to a business on the cloud environment. Our guest Matthew Gardner is the director of security marketing for mimecast and he is talking about all the different dynamics of security on the cloud. he has also explained multi-layer protection methods against phishing attacks, which are considered to be the primary source of attacks. Today's show also discusses, suggested changes that you can make on an individual or corporate level to protect against the most common cloud attacks. Some of the best advice I heard today are methods of evaluating the security of your cloud service providers.

Today, our guest Robert Schwertner, also known as Cryptorobby, gives us some insight on how we can use blockchain in many industries. Has your company been entertaining a Blockchain solution? You will want to listen today as our guest discusses how to create secure ecosystems using blockchain. Hear how blockchain benefits the community, and even some pitfalls to avoid. Can blockchain prevent cyber attacks in the energy sector? Cryptorobby tells us about some new projects which will hopefully revolutionize the energy industry. Whether you need to increase business revenue, reduce risk of threats, or just get ahead of the competition you will not want to miss today’s show.

Our today’s show is with Jane Ginn and Doug DePeppe of Cyber Resilience Institute (CRI). CRI is involving community to create forums for protection against the ongoing cyber-attacks. They are building self-sustainable model to generate revenue by aligning CRI’s programs with sports and working in international events to strengthen their cybersecurity. Non-Profit organizations such as CRI are involving students with internships, to improve their technical and analytical skills. In this show our guests are discussing the future for information sharing, community cyber initiative that you can get involved with, and methods to address risk of cyber attack to our civil venues such as sporting events. Listen to hear how ISAOs use tools such as secure social media to identify threats to big sports events and much more.